aws-sdk-s3 1.179.0 → 1.182.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -852,20 +852,17 @@ module Aws::S3
852
852
  # Signature Version in Request Authentication][1] in the *Amazon S3 User
853
853
  # Guide*.
854
854
  #
855
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
856
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
857
- # header is implicitly assigned the ID of the KMS symmetric encryption
858
- # customer managed key that's configured for your directory bucket's
859
- # default encryption setting. If you want to specify the `
860
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
861
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
862
- # customer managed key that's configured for your directory bucket's
863
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
864
- # Request` error. Only use the key ID or key ARN. The key alias format
865
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
866
- # support 1 [customer managed key][2] per directory bucket for the
867
- # lifetime of the bucket. The [Amazon Web Services managed key][3]
868
- # (`aws/s3`) isn't supported.
855
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
856
+ # recommended to specify the `x-amz-server-side-encryption` header to
857
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
858
+ # header implicitly uses the bucket's default KMS customer managed key
859
+ # ID. If you want to explicitly set the `
860
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
861
+ # bucket's default customer managed key (using key ID or ARN, not
862
+ # alias). Your SSE-KMS configuration can only support 1 [customer
863
+ # managed key][2] per directory bucket's lifetime. The [Amazon Web
864
+ # Services managed key][3] (`aws/s3`) isn't supported. Incorrect key
865
+ # specification results in an HTTP `400 Bad Request` error.
869
866
  #
870
867
  #
871
868
  #
@@ -1136,7 +1133,7 @@ module Aws::S3
1136
1133
  #
1137
1134
  #
1138
1135
  #
1139
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
1136
+ # [1]: https://tools.ietf.org/html/rfc7232
1140
1137
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
1141
1138
  # If present, the object is deleted only if its modification times
1142
1139
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -1417,15 +1414,6 @@ module Aws::S3
1417
1414
  # fails with the HTTP status code `403 Forbidden` (access denied).
1418
1415
  # @option options [String] :checksum_mode
1419
1416
  # To retrieve the checksum, this mode must be enabled.
1420
- #
1421
- # **General purpose buckets** - In addition, if you enable checksum mode
1422
- # and the object is uploaded with a [checksum][1] and encrypted with an
1423
- # Key Management Service (KMS) key, you must have permission to use the
1424
- # `kms:Decrypt` action to retrieve the checksum.
1425
- #
1426
- #
1427
- #
1428
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
1429
1417
  # @return [Types::GetObjectOutput]
1430
1418
  def get(options = {}, &block)
1431
1419
  options = options.merge(
@@ -1886,20 +1874,17 @@ module Aws::S3
1886
1874
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
1887
1875
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
1888
1876
  #
1889
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
1890
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
1891
- # header is implicitly assigned the ID of the KMS symmetric encryption
1892
- # customer managed key that's configured for your directory bucket's
1893
- # default encryption setting. If you want to specify the `
1894
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
1895
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
1896
- # customer managed key that's configured for your directory bucket's
1897
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
1898
- # Request` error. Only use the key ID or key ARN. The key alias format
1899
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
1900
- # support 1 [customer managed key][1] per directory bucket for the
1901
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
1902
- # (`aws/s3`) isn't supported.
1877
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
1878
+ # recommended to specify the `x-amz-server-side-encryption` header to
1879
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
1880
+ # header implicitly uses the bucket's default KMS customer managed key
1881
+ # ID. If you want to explicitly set the `
1882
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
1883
+ # bucket's default customer managed key (using key ID or ARN, not
1884
+ # alias). Your SSE-KMS configuration can only support 1 [customer
1885
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
1886
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
1887
+ # specification results in an HTTP `400 Bad Request` error.
1903
1888
  #
1904
1889
  #
1905
1890
  #
@@ -2185,15 +2170,15 @@ module Aws::S3
2185
2170
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2186
2171
  # the supported algorithm from the following list:
2187
2172
  #
2188
- # * `CRC-32`
2173
+ # * `CRC32`
2189
2174
  #
2190
- # * `CRC-32C`
2175
+ # * `CRC32C`
2191
2176
  #
2192
- # * `CRC-64NVME`
2177
+ # * `CRC64NVME`
2193
2178
  #
2194
- # * `SHA-1`
2179
+ # * `SHA1`
2195
2180
  #
2196
- # * `SHA-256`
2181
+ # * `SHA256`
2197
2182
  #
2198
2183
  # For more information, see [Checking object integrity][1] in the
2199
2184
  # *Amazon S3 User Guide*.
@@ -2221,7 +2206,7 @@ module Aws::S3
2221
2206
  # @option options [String] :checksum_crc32
2222
2207
  # This header can be used as a data integrity check to verify that the
2223
2208
  # data received is the same data that was originally sent. This header
2224
- # specifies the Base64 encoded, 32-bit `CRC-32` checksum of the object.
2209
+ # specifies the Base64 encoded, 32-bit `CRC32` checksum of the object.
2225
2210
  # For more information, see [Checking object integrity][1] in the
2226
2211
  # *Amazon S3 User Guide*.
2227
2212
  #
@@ -2231,7 +2216,7 @@ module Aws::S3
2231
2216
  # @option options [String] :checksum_crc32c
2232
2217
  # This header can be used as a data integrity check to verify that the
2233
2218
  # data received is the same data that was originally sent. This header
2234
- # specifies the Base64 encoded, 32-bit `CRC-32C` checksum of the object.
2219
+ # specifies the Base64 encoded, 32-bit `CRC32C` checksum of the object.
2235
2220
  # For more information, see [Checking object integrity][1] in the
2236
2221
  # *Amazon S3 User Guide*.
2237
2222
  #
@@ -2241,10 +2226,10 @@ module Aws::S3
2241
2226
  # @option options [String] :checksum_crc64nvme
2242
2227
  # This header can be used as a data integrity check to verify that the
2243
2228
  # data received is the same data that was originally sent. This header
2244
- # specifies the Base64 encoded, 64-bit `CRC-64NVME` checksum of the
2245
- # object. The `CRC-64NVME` checksum is always a full object checksum.
2246
- # For more information, see [Checking object integrity in the Amazon S3
2247
- # User Guide][1].
2229
+ # specifies the Base64 encoded, 64-bit `CRC64NVME` checksum of the
2230
+ # object. The `CRC64NVME` checksum is always a full object checksum. For
2231
+ # more information, see [Checking object integrity in the Amazon S3 User
2232
+ # Guide][1].
2248
2233
  #
2249
2234
  #
2250
2235
  #
@@ -2252,9 +2237,9 @@ module Aws::S3
2252
2237
  # @option options [String] :checksum_sha1
2253
2238
  # This header can be used as a data integrity check to verify that the
2254
2239
  # data received is the same data that was originally sent. This header
2255
- # specifies the Base64 encoded, 160-bit `SHA-1` digest of the object.
2256
- # For more information, see [Checking object integrity][1] in the
2257
- # *Amazon S3 User Guide*.
2240
+ # specifies the Base64 encoded, 160-bit `SHA1` digest of the object. For
2241
+ # more information, see [Checking object integrity][1] in the *Amazon S3
2242
+ # User Guide*.
2258
2243
  #
2259
2244
  #
2260
2245
  #
@@ -2262,7 +2247,7 @@ module Aws::S3
2262
2247
  # @option options [String] :checksum_sha256
2263
2248
  # This header can be used as a data integrity check to verify that the
2264
2249
  # data received is the same data that was originally sent. This header
2265
- # specifies the Base64 encoded, 256-bit `SHA-256` digest of the object.
2250
+ # specifies the Base64 encoded, 256-bit `SHA256` digest of the object.
2266
2251
  # For more information, see [Checking object integrity][1] in the
2267
2252
  # *Amazon S3 User Guide*.
2268
2253
  #
@@ -2509,20 +2494,17 @@ module Aws::S3
2509
2494
  # `x-amz-server-side-encryption-aws-kms-key-id`, Amazon S3 uses the
2510
2495
  # Amazon Web Services managed key (`aws/s3`) to protect the data.
2511
2496
  #
2512
- # **Directory buckets** - If you specify `x-amz-server-side-encryption`
2513
- # with `aws:kms`, the ` x-amz-server-side-encryption-aws-kms-key-id`
2514
- # header is implicitly assigned the ID of the KMS symmetric encryption
2515
- # customer managed key that's configured for your directory bucket's
2516
- # default encryption setting. If you want to specify the `
2517
- # x-amz-server-side-encryption-aws-kms-key-id` header explicitly, you
2518
- # can only specify it with the ID (Key ID or Key ARN) of the KMS
2519
- # customer managed key that's configured for your directory bucket's
2520
- # default encryption setting. Otherwise, you get an HTTP `400 Bad
2521
- # Request` error. Only use the key ID or key ARN. The key alias format
2522
- # of the KMS key isn't supported. Your SSE-KMS configuration can only
2523
- # support 1 [customer managed key][1] per directory bucket for the
2524
- # lifetime of the bucket. The [Amazon Web Services managed key][2]
2525
- # (`aws/s3`) isn't supported.
2497
+ # **Directory buckets** - To encrypt data using SSE-KMS, it's
2498
+ # recommended to specify the `x-amz-server-side-encryption` header to
2499
+ # `aws:kms`. Then, the `x-amz-server-side-encryption-aws-kms-key-id`
2500
+ # header implicitly uses the bucket's default KMS customer managed key
2501
+ # ID. If you want to explicitly set the `
2502
+ # x-amz-server-side-encryption-aws-kms-key-id` header, it must match the
2503
+ # bucket's default customer managed key (using key ID or ARN, not
2504
+ # alias). Your SSE-KMS configuration can only support 1 [customer
2505
+ # managed key][1] per directory bucket's lifetime. The [Amazon Web
2506
+ # Services managed key][2] (`aws/s3`) isn't supported. Incorrect key
2507
+ # specification results in an HTTP `400 Bad Request` error.
2526
2508
  #
2527
2509
  #
2528
2510
  #
@@ -2967,15 +2949,15 @@ module Aws::S3
2967
2949
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
2968
2950
  # the supported algorithm from the following list:
2969
2951
  #
2970
- # * `CRC-32`
2952
+ # * `CRC32`
2971
2953
  #
2972
- # * `CRC-32C`
2954
+ # * `CRC32C`
2973
2955
  #
2974
- # * `CRC-64NVME`
2956
+ # * `CRC64NVME`
2975
2957
  #
2976
- # * `SHA-1`
2958
+ # * `SHA1`
2977
2959
  #
2978
- # * `SHA-256`
2960
+ # * `SHA256`
2979
2961
  #
2980
2962
  # For more information, see [Checking object integrity][1] in the
2981
2963
  # *Amazon S3 User Guide*.
@@ -326,7 +326,7 @@ module Aws::S3
326
326
  #
327
327
  #
328
328
  #
329
- # [1]: https://docs.aws.amazon.com/https:/tools.ietf.org/html/rfc7232
329
+ # [1]: https://tools.ietf.org/html/rfc7232
330
330
  # @option options [Time,DateTime,Date,Integer,String] :if_match_last_modified_time
331
331
  # If present, the object is deleted only if its modification times
332
332
  # matches the provided `Timestamp`. If the `Timestamp` values do not
@@ -578,15 +578,6 @@ module Aws::S3
578
578
  # fails with the HTTP status code `403 Forbidden` (access denied).
579
579
  # @option options [String] :checksum_mode
580
580
  # To retrieve the checksum, this mode must be enabled.
581
- #
582
- # **General purpose buckets** - In addition, if you enable checksum mode
583
- # and the object is uploaded with a [checksum][1] and encrypted with an
584
- # Key Management Service (KMS) key, you must have permission to use the
585
- # `kms:Decrypt` action to retrieve the checksum.
586
- #
587
- #
588
- #
589
- # [1]: https://docs.aws.amazon.com/AmazonS3/latest/API/API_Checksum.html
590
581
  # @return [Types::GetObjectOutput]
591
582
  def get(options = {}, &block)
592
583
  options = options.merge(
@@ -924,15 +915,15 @@ module Aws::S3
924
915
  # For the `x-amz-checksum-algorithm ` header, replace ` algorithm ` with
925
916
  # the supported algorithm from the following list:
926
917
  #
927
- # * `CRC-32`
918
+ # * `CRC32`
928
919
  #
929
- # * `CRC-32C`
920
+ # * `CRC32C`
930
921
  #
931
- # * `CRC-64NVME`
922
+ # * `CRC64NVME`
932
923
  #
933
- # * `SHA-1`
924
+ # * `SHA1`
934
925
  #
935
- # * `SHA-256`
926
+ # * `SHA256`
936
927
  #
937
928
  # For more information, see [Checking object integrity][1] in the
938
929
  # *Amazon S3 User Guide*.
@@ -41,7 +41,7 @@ module Aws::S3
41
41
  # acl: "private", # accepts private, public-read, public-read-write, authenticated-read
42
42
  # bucket: "BucketName", # required
43
43
  # create_bucket_configuration: {
44
- # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
44
+ # location_constraint: "af-south-1", # accepts af-south-1, ap-east-1, ap-northeast-1, ap-northeast-2, ap-northeast-3, ap-south-1, ap-south-2, ap-southeast-1, ap-southeast-2, ap-southeast-3, ap-southeast-4, ap-southeast-5, ca-central-1, cn-north-1, cn-northwest-1, EU, eu-central-1, eu-central-2, eu-north-1, eu-south-1, eu-south-2, eu-west-1, eu-west-2, eu-west-3, il-central-1, me-central-1, me-south-1, sa-east-1, us-east-2, us-gov-east-1, us-gov-west-1, us-west-1, us-west-2
45
45
  # location: {
46
46
  # type: "AvailabilityZone", # accepts AvailabilityZone, LocalZone
47
47
  # name: "LocationNameAsString",